Recent Searches

You haven't searched anything yet.

3 Security Operations Center (SOC) Analyst Jobs in Sterling, VA

SET JOB ALERT
Details...
Vectrus
Sterling, VA | Full Time
$146k-180k (estimate)
1 Week Ago
Summit-Tek, Inc.
Sterling, VA | Full Time
$115k-129k (estimate)
8 Months Ago
Allied Universal
Sterling, VA | Full Time
$72k-91k (estimate)
4 Days Ago
Security Operations Center (SOC) Analyst
Summit-Tek, Inc. Sterling, VA
$115k-129k (estimate)
Full Time 8 Months Ago
Save

Summit-Tek, Inc. is Hiring a Security Operations Center (SOC) Analyst Near Sterling, VA

Job Description:

Duties:

  • Performs network security monitoring and incident response for a large organization.
  • Coordinates with other government agencies to record and report incidents.
  • Maintains records of security monitoring and incident response activities, utilizing case management and ticketing technologies.
  • Monitors Security Information and Event Management (SIEM) to identify security issues for remediation.
  • Recognizes potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information. Communicates alerts to agencies regarding intrusions and compromises to their network infrastructure, applications and operating systems.
  • Assists with implementation of countermeasures or mitigating controls.
  • Supports efforts to consolidate and conduct comprehensive analysis of threat data obtained from classified, proprietary, and open-source resources to provide indication and warnings of impending attacks against unclassified and classified networks.
  • Supports Team Lead on developing recommendations for changes to Standard Operating Procedures and other similar documentation.
  • Monitors and reviews logs from existing security tools and creates new security tool signatures to ensure maximum performance and availability.
  • Performs all aspects of intrusion detection, log and audit management, network and database vulnerability assessment and compliance management, and security configuration.
  • Installs, configures, troubleshoots, and maintains server configurations (hardware and software) to ensure their confidentiality, integrity, and availability. Also manages accounts, security devices, and patches; responsible for access control/passwords/account creation and administration.
  • Analyze collected information to identify vulnerabilities and potential for exploitation.
  • Provides support in the identification, documentation, and development of computer and network security countermeasures.
  • Identifies network and operating systems vulnerabilities and recommends countermeasures.
  • Supports the deployment and integration of security tools as needed.
  • Prepares written reports and provides verbal information security briefings.
  • Investigates, monitors, analyzes, and reports on information security incidents.
  • Responds to crisis or urgent situations within the pertinent domain to mitigate immediate and potential threats.
  • Use mitigation, preparedness, and response and recovery approaches, as needed to maximize information security.
  • Provides incident handling support for incident detection, analysis, coordination, and response.
  • Monitors network to actively remediate unauthorized activities.
  • Monitors intrusion detection sensors and log collection hardware and software to ensure systems are collecting relevant data.
  • Monitors all security systems to ensure maximum performance and availability.
  • Analyze computer security threat information from multiple sources, disciplines, and agencies across.

Required Qualifications:

  • Bachelor’s degree from an accredited college or university in one or more of the following disciplines or equivalent (documented formal training): computer science, information systems, engineering, business, physical science, or other technology-related discipline

· Education Substitution:

  • Any combination of certificates such as Microsoft’s MCSE, or Cisco’s, CCNA, CCDA, or CCNP, may be considered equivalent to two (2) year of general experience / information technology experience. Certificates under the DoD IAM, IAT, IASAE, or CSSP Levels I, II or III may be considered equivalent to two (2) years of information security experience.
  • Three (3) years of documented work experience performing any combination of Information System Security, Security Assessment & Authorization, Cybersecurity, Computer Forensics, or Insider Threat
  • Secret clearance: must be eligible for a Top-Secret clearance, if requested.

Desired Qualifications:

  • CompTIA CySA cybersecurity analyst certification
  • Cybersecurity Incident response and Detection experience.
  • Experience in cybersecurity event triaging. Utilizing the seven steps of the Incident Response Process – (IRP)
  • Security Operation Center Experience – (SOC)
  • Conducting cyber event investigations to determine root cause of the event. Determining if the event is a True/False Positive.
  • Creating rules, thresholds, and policies associated with cybersecurity tool platforms designed to prevent Indicators of Compromise/Attack from occurring. IOC’s/IOA’s
  • Verification & Validation of information, containment, eradication, and recovery from incidents.
  • Experience in validating Hash’s Malicious IP’s, URL’s
  • Experience in investigation malicious emails and payloads
  • Requirements analysis, program development activities, architecture, engineering, integrating, developing and/or deploying information technology products (hardware and software) in an enterprise environment.
  • Ability to create and monitor multiple cybersecurity tools dashboards.
  • Experience in Open-Source Intelligence gathering.
  • Experience with Threat hunting and vulnerability assessment
  • Knowledge of SIEM tools and query generation

General Experience: SOC (Security Operations Center) operations, vulnerability analysis, triaging, incident handling, reporting, ticket generation and handling, assisting with incident resolution.

Relevant Cybersecurity Analyst Experience:

  • Work experience and knowledge in; vulnerability assessment, analysis, and mitigation; analyzing security system logs, security tools, and data; network monitoring, and intrusion detection using host-based and network-based intrusion detection systems (IDS) and log management applications; testing, installing, patching, and upgrading computer hardware and operating systems (Windows, and UNIX) in an enterprise environment; identifying, collecting, processing, documenting, reporting, cyber security/incident response events; architecting, engineering, developing and implementing cyber security/incident response policies and procedures; engineering, testing, installing, patching, and upgrading various information security hardware and software applications.
  • Familiarity with SourceFire, Arcsight, Splunk, NetWitness, Guidance Software, Digital Guardian, SureView, Intelliview, Nessus, and Foundstone.
  • Penetration testing experience for networks, web applications, and enterprise systems. Experience with Federal cybersecurity standards, industry best practices and guidelines.

Job Type: Full-time

Pay: $115,000.00 - $129,000.00 per year

Benefits:

  • Paid time off

Experience level:

  • 3 years

Schedule:

  • 8 hour shift
  • Monday to Friday

Education:

  • Bachelor's (Required)

Experience:

  • SOC Analyst: 3 years (Required)
  • Cybersecurity: 1 year (Required)

Security clearance:

  • Secret (Required)

Work Location: Hybrid remote in Sterling, VA 20166

Job Summary

JOB TYPE

Full Time

SALARY

$115k-129k (estimate)

POST DATE

09/27/2023

EXPIRATION DATE

05/15/2024

Show more

The job skills required for Security Operations Center (SOC) Analyst include Analysis, Security Systems, Computer Science, Access Control, Planning, Information Security, etc. Having related job skills and expertise will give you an advantage when applying to be a Security Operations Center (SOC) Analyst. That makes you unique and can impact how much salary you can get paid. Below are job openings related to skills required by Security Operations Center (SOC) Analyst. Select any job title you are interested in and start to search job requirements.

For the skill of  Analysis
Greytek
Full Time
$107k-137k (estimate)
Just Posted
For the skill of  Security Systems
Mindsource
Full Time
$108k-132k (estimate)
3 Days Ago
For the skill of  Computer Science
Columbia College
Part Time | Contractor
$60k-104k (estimate)
2 Days Ago
Show more

The following is the career advancement route for Security Operations Center (SOC) Analyst positions, which can be used as a reference in future career path planning. As a Security Operations Center (SOC) Analyst, it can be promoted into senior positions as an Information Security Analyst IV that are expected to handle more key tasks, people in this role will get a higher salary paid than an ordinary Security Operations Center (SOC) Analyst. You can explore the career advancement for a Security Operations Center (SOC) Analyst below and select your interested title to get hiring information.

Evolver, LLC
Full Time
$100k-126k (estimate)
2 Months Ago